Skip to main content

Posts

Showing posts from October, 2020

Hacking with Security Tools Part - 4

  Top 10 Security Tools in Kali Linux Introduction  Welcome to module 4 of this workshop. So far, you have learned about hacking with Kali Linux and a taste of how you can utilize Kali Linux as a base platform for exploit development. Here we will highlight the top 10 security tools available in Kali Linux and their purpose.   Prerequisites  It is recommended that you should first complete the previous three modules before you start reading this module.   Top Ten Security Tools available in Kali Linux   Use the application tab and expand the top ten security tools as shown in below figure. You can see the list of tools in the most right tab open under the category top 10 security tools. We will expand each tool one by one.   The first tool, which is presented under top ten categories, is air-crack.     From the vendor’s mouth “Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS

Hacking with Security Tools Part - 3

  Kali Linux and Exploit Development Introduction    Welcome to the exploit development module. So far, we have been talking about the ethical hacking aspects of Kali Linux. You can also use this wonderful security distribution in the exploit development. Kali Linux comes with pre-installed tools and accessories, which gives support in the exploit development lifecycle. In this module, we will not be explaining “what is exploit development” but we will be discussing where Kali Linux can be used in the exploit development.  Prerequisites  • Basic concepts of exploits  • Prior knowledge about debugging  • Programming concepts  • TCP/IP understanding  • Understanding the background of exploit development   Kali Linux Exploit Development Support   Covering the real aspects of exploit development lifecycle, Kali Linux basically is not a full fleshed exploit development platform, however, it has pre-installed tools that have exploit development as a native feature. Kali Linux also comes